Ethical Hacking Unit 5 Review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

PSH

Alex, a security specialist, is using an Xmas tree scan. Which TCP flag will be sent back if the port is closed?

SYN/ACK

TCP is a connection-oriented protocol that uses a three-way handshake to establish a connection to a system port. Computer 1 sends a SYN packet to Computer 2. Which packet does Computer 2 send back?

Idle scan

A hacker finds a target machine but wants to avoid getting caught, so the hacker finds another system to take the blame. This system is frequently called a zombie machine because it's disposable and creates a good distraction. Which port scan is being used?

The tool of choice for banner grabbing that operates on port 23.

Which best describes telnet?

Wardialing

A technician is using a modem to dial a large block of phone numbers in an attempt to locate other systems connected to a modem. Which type of network scan is being used?

nmap -sV --script=banner ip_address

Nmap can be used for banner grabbing. Nmap connects to an open TCP port and returns anything sent in a five-second period. What is the proper nmap command?

Fingerprinting

Randy is an ethical hacker student. He has learned how nmap flag manipulation can help find open ports. Although the name of the operating system did not jump right out at him, he might be able to figure it out by reviewing packet information. In a packet, Randy can see a TTL of 255 and a window size of 4128. What type of scanning process is Randy using?

Colasoft

Which packet crafting software programs can be used to modify flags and adjust other packet content?

Port scan

Which scan is used to actively engage a target in an attempt to gather information about it?

Network scan

A ping sweep is used to scan a range of IP addresses to look for live systems. A ping sweep can also alert a security system, which could result in an alarm being triggered or an attempt being blocked. Which type of scan is being used? Decoy scan

P0f

Joe wants to use a stealthy Linux tool that analyzes network traffic and returns information about operating systems. Which banner grabbing tools is he most likely to use?

Scany

You are using an iOS device. You want to scan networks, websites, and ports to find open network devices. Which mapping tools should you use?

Currports

You want a list of all open UDP and TCP ports on your computer. You also want to know which process opened the port, which user created the process, and what time is was created. Which scanning tools should you use?

Netcraft

What is the online tool that is used to obtain server and web server information?

Vulnerability scan

What type of scan is used to find system weaknesses such as open ports, access points, and other potential threats?

Helps determine whether the firewall is stateful or stateless and whether or not the ports are open.

Which best describes the scan with ACK evasion method?

Banner grabbing

Which do technique hackers use to obtain information about the services running on a target system?

It filters incoming and outgoing traffic, provides you with anonymity, and shields you from detection.

Which is a benefit of using a proxy when you find that your scanning attempts are being blocked?


Set pelajaran terkait

Laptop Hardware - CompTIA A+ 220-1001 - 1.1

View Set

ACE 346 Exam 2 Polling Questions

View Set

Earthquakes and Volcanoes Study Guide for Test

View Set

Chapter 55: Management of Patients with Urinary Disorders

View Set

26, 58, 59, 60, 42 Special Senses - Medical, Surgical and Diagnostic Procedures + Meds, Upper Respiratory Disorders (Med/Surg)

View Set